Chapter 11

Auditing for Security

Information in this chapter:

• Login Auditing

• Data Modification Auditing

• Data Querying Auditing

• Schema Change Auditing

• Using Policy-Based Management to Ensure Policy Compliance

• C2 Auditing

• Common Criteria Compliance

• Summary

Setting security policies is a great start, but you need to ensure that the system remains secure. This is where auditing comes into play. Auditing by itself isn’t good enough; someone needs to review the auditing information that has been collected in order to ensure that the system has remained as secure as expected. This includes monitoring the logins into the database, the data that has been changed, and any changes to the schema.

As you move from the newer versions of Microsoft ...

Get Securing SQL Server, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.